This is a client hello message in the TLS protocol sent from the client. Full
spec is found on https://www.ietf.org/rfc/rfc5246.txt and
I suggest using Wireshark to analyze network traffic but basically your message
is described by
16 Content type (handshake)
03 01 TLS versio
crypted: [80, 83, 98, 6b, 55, 98, 73, b4, f6, 22, 2d,
>> 88, b, 4d, af, 6f, 2d, d6, 1e, 9, 1d, b1, 94, f4, 49, 20, 15, d2, a0,
>> a0, 35, c5, 95, 3d, d3, 35, fd, 92, ef, a6, 0, 7d, 49, 3, 70, 5e, 5a,
>> 57, e3, f9, 89, 3f, 83, 11, cf, 82, 4e, a3, 87, 6e, 9e, 97, 9c, 7c]
&g
14 Feb 2018, at 0:26 , Matt Caswell wrote:
>
>
>
> On 13/02/18 22:02, Curt Johansson wrote:
>> Hi all,
>>
>> I'm developing support for TLS 1.1 and 1.2 in a radius-server that until now
>> only handles TLS 1.0. I'm testing with a testtool that the
o I did some
serious C coding so I hope someone with a working knowledge can enlighten me. I
might have
misunderstood the spec but in that case I would be grateful if someone could
clarify this specific part of it.
TIA
Curt Johansson
--
openssl-users mailing list
To unsubscribe: https://